Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-10-2024 01:23
Static task
static1
Behavioral task
behavioral1
Sample
1ab68861cbb539af250899445e168233_JaffaCakes118.xll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ab68861cbb539af250899445e168233_JaffaCakes118.xll
Resource
win10v2004-20240802-en
General
-
Target
1ab68861cbb539af250899445e168233_JaffaCakes118.xll
-
Size
1.2MB
-
MD5
1ab68861cbb539af250899445e168233
-
SHA1
e4299a99e197c034b76f9415acb599c810f4f659
-
SHA256
7b05d46b12945a754e07915535b5c977078818b088ce5de1a31ff40b3c2bef61
-
SHA512
3ce1f719220f13fafb5fc07d0c8def676fd717ecf3e068088b0e0bf35b686866b0e9adc4cd051fd2990f46df5b120e365e77b93b8f6ff5863297a3fcd6a6a518
-
SSDEEP
24576:DzbGHAzHKjX1rBY4ZyrE7K3yl8PeVooA/AB2LEgpUqY/CL+elRtA3k0yy3l4VzCa:DziHILpUhxel6k0yyW094
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
EXCEL.EXEpid process 876 EXCEL.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 876 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
EXCEL.EXEpid process 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\1ab68861cbb539af250899445e168233_JaffaCakes118.xll1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e